ÆÈ·Î¿ì
Issa Traore
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Detection of online fake news using n-gram analysis and machine learning techniques
H Ahmed, I Traore, S Saad
Intelligent, Secure, and Dependable Systems in Distributed and Cloud ¡¦, 2017
5732017
A new biometric technology based on mouse dynamics
AAE Ahmed, I Traore
IEEE Transactions on dependable and secure computing 4 (3), 165-179, 2007
4912007
Botnet detection based on traffic behavior analysis and flow intervals
D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani, D Garant
computers & security 39, 2-16, 2013
4312013
Detecting P2P botnets through network behavior analysis and machine learning
S Saad, I Traore, A Ghorbani, B Sayed, D Zhao, W Lu, J Felix, P Hakimian
2011 Ninth annual international conference on privacy, security and trust ¡¦, 2011
3842011
Detecting opinion spams and fake news using text classification
H Ahmed, I Traore, S Saad
Security and Privacy 1 (1), e9, 2018
3602018
Detecting new forms of network intrusion using genetic programming
W Lu, I Traore
Computational intelligence 20 (3), 475-494, 2004
2382004
System and method for determining a computer user profile from a motion-based input device
AAES Ahmed, I Traore
US Patent 8,230,232, 2012
2312012
Biometric recognition based on free-text keystroke dynamics
AA Ahmed, I Traore
IEEE transactions on cybernetics 44 (4), 458-472, 2013
1802013
Authorship verification for short messages using stylometry
ML Brocardo, I Traore, S Saad, I Woungang
2013 International Conference on Computer, Information and Telecommunication ¡¦, 2013
1602013
Anomaly intrusion detection based on biometrics
AAE Ahmed, I Traore
Proceedings from the sixth annual IEEE SMC information assurance workshop ¡¦, 2005
1572005
Improving mouse dynamics biometric performance using variance reduction via extractors with separate features
Y Nakkabi, I Traoré, AAE Ahmed
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and ¡¦, 2010
1082010
Biometric authentication using mouse gesture dynamics
B Sayed, I Traoré, I Woungang, MS Obaidat
IEEE systems journal 7 (2), 262-274, 2013
1062013
Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments
I Traore, I Woungang, MS Obaidat, Y Nakkabi, I Lai
2012 fourth international conference on digital home, 138-145, 2012
1052012
The proactive and reactive digital forensics investigation process: A systematic literature review
S Alharbi, J Weber-Jahnke, I Traore
Information Security and Assurance: International Conference, ISA 2011, Brno ¡¦, 2011
1002011
Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics
I Traore
Igi Global, 2011
992011
Biometric-based physical and cybersecurity systems
MS Obaidat, I Traore, I Woungang
Springer International Publishing, 2019
972019
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
882015
Detecting Computer Intrusions Using Behavioral Biometrics.
AAE Ahmed, I Traore
PST, 2005
852005
Authorship verification of e-mail and tweet messages applied for continuous authentication
ML Brocardo, I Traore, I Woungang
Journal of Computer and System Sciences 81 (8), 1429-1440, 2015
842015
Peer to peer botnet detection based on flow intervals
D Zhao, I Traore, A Ghorbani, B Sayed, S Saad, W Lu
Information Security and Privacy Research: 27th IFIP TC 11 Information ¡¦, 2012
842012
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20